MGASA-2020-0193 - Updated dolphin-emu packages fix security vulnerability

Publication date: 05 May 2020
URL: https://advisories.mageia.org/MGASA-2020-0193.html
Type: security
Affected Mageia releases: 7
CVE: CVE-2017-9258,
     CVE-2017-9259,
     CVE-2017-9260,
     CVE-2018-14044,
     CVE-2018-14045,
     CVE-2018-17096,
     CVE-2018-17097,
     CVE-2018-17098,
     CVE-2018-1000223,
     

Updated dolphin-emu package fixes security vulnerabilities

Dolphin Emulator includes a modified copy of the SoundTouch library at
version 1.9.2. That version is subject to the following security issues:

- The TDStretch::processSamples function in source/SoundTouch/TDStretch.cpp
  in SoundTouch 1.9.2 allows remote attackers to cause a denial of service
  (infinite loop and CPU consumption) via a crafted wav file (CVE-2017-9258)

- The TDStretch::acceptNewOverlapLength function in source/SoundTouch/
  TDStretch.cpp in SoundTouch 1.9.2 allows remote attackers to cause a
  denial of service (memory allocation error and application crash) via a
  crafted wav file (CVE-2017-9259).

- The TDStretchSSE::calcCrossCorr function in source/SoundTouch/
  sse_optimized.cpp in SoundTouch 1.9.2 allows remote attackers to cause a
  denial of service (heap-based buffer over-read and application crash) via
  a crafted wav file (CVE-2017-9260).

- Reachable assertion in RateTransposer::setChannels() causing denial of
  service (CVE-2018-14044).

- Reachable assertion in FIRFilter.cpp causing denial of service
  (CVE-2018-14045).

- Assertion failure in BPMDetect class in BPMDetect.cpp (CVE-2018-17096).

- Out-of-bounds heap write in WavOutFile::write() (CVE-2018-17097).

- Heap corruption in WavFileBase class in WavFile.cpp (CVE-2018-17098).

- Heap-based buffer overflow in SoundStretch/WavFile.cpp:WavInFile
  ::readHeaderBlock() potentially leading to code execution
  (CVE-2018-1000223).

The bundled copy of SoundTouch was updated to version 2.1.2, thereby solving
theses issues in Dolphin Emulator.

References:
- https://bugs.mageia.org/show_bug.cgi?id=26555
- http://advisories.mageia.org/MGASA-2018-0331.html
- http://advisories.mageia.org/MGASA-2018-0385.html
- http://advisories.mageia.org/MGASA-2018-0462.html
- https://github.com/dolphin-emu/dolphin/pull/8725
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9258
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9259
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9260
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14044
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14045
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17096
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17097
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17098
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000223
- https://cve.mitre.org/cgi-bin/cvename.cgi?name
SRPMS:
- 7/tainted/dolphin-emu-5.0.11824-1.mga7.tainted

Mageia 2020-0193: dolphin-emu security update

Updated dolphin-emu package fixes security vulnerabilities Dolphin Emulator includes a modified copy of the SoundTouch library at version 1.9.2

Summary


Updated dolphin-emu package fixes security vulnerabilities
Dolphin Emulator includes a modified copy of the SoundTouch library at version 1.9.2. That version is subject to the following security issues:
- The TDStretch::processSamples function in source/SoundTouch/TDStretch.cpp in SoundTouch 1.9.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted wav file (CVE-2017-9258)
- The TDStretch::acceptNewOverlapLength function in source/SoundTouch/ TDStretch.cpp in SoundTouch 1.9.2 allows remote attackers to cause a denial of service (memory allocation error and application crash) via a crafted wav file (CVE-2017-9259).
- The TDStretchSSE::calcCrossCorr function in source/SoundTouch/ sse_optimized.cpp in SoundTouch 1.9.2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted wav file (CVE-2017-9260).
- Reachable assertion in RateTransposer::setChannels() causing denial of service (CVE-2018-14044).
- Reachable assertion in FIRFilter.cpp causing denial of service (CVE-2018-14045).
- Assertion failure in BPMDetect class in BPMDetect.cpp (CVE-2018-17096).
- Out-of-bounds heap write in WavOutFile::write() (CVE-2018-17097).
- Heap corruption in WavFileBase class in WavFile.cpp (CVE-2018-17098).
- Heap-based buffer overflow in SoundStretch/WavFile.cpp:WavInFile ::readHeaderBlock() potentially leading to code execution (CVE-2018-1000223).
The bundled copy of SoundTouch was updated to version 2.1.2, thereby solving theses issues in Dolphin Emulator.

References

- https://bugs.mageia.org/show_bug.cgi?id=26555

- http://advisories.mageia.org/MGASA-2018-0331.html

- http://advisories.mageia.org/MGASA-2018-0385.html

- http://advisories.mageia.org/MGASA-2018-0462.html

- https://github.com/dolphin-emu/dolphin/pull/8725

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9258

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9259

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9260

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14044

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14045

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17096

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17097

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17098

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000223

- https://cve.mitre.org/cgi-bin/cvename.cgi?name

Resolution

MGASA-2020-0193 - Updated dolphin-emu packages fix security vulnerability

SRPMS

- 7/tainted/dolphin-emu-5.0.11824-1.mga7.tainted

Severity
Publication date: 05 May 2020
URL: https://advisories.mageia.org/MGASA-2020-0193.html
Type: security
CVE: CVE-2017-9258, CVE-2017-9259, CVE-2017-9260, CVE-2018-14044, CVE-2018-14045, CVE-2018-17096, CVE-2018-17097, CVE-2018-17098, CVE-2018-1000223,

Related News